pygrum Profile
pygrum

@spygrum

Followers
96
Following
45
Media
3
Statuses
12

opinions are not my own, im being controlled

Joined May 2023
Don't wanna be here? Send us removal request.
@spygrum
pygrum
3 days
RT @0xLegacyy: Developing a scriptable (pwndbg-like) debugger for windows. Few more things we need to iron out but will be releasing soon 🐸….
0
19
0
@spygrum
pygrum
27 days
I've most recently added liveness info for registers / flags. No more pushf / popf pairs to make things a bit harder for analysts \( -_-)/
Tweet card summary image
github.com
Rewrite and obfuscate code in compiled binaries. Contribute to badhive/stitch development by creating an account on GitHub.
@spygrum
pygrum
1 month
Wrote a cross-platform library for rewriting / modifying code in executable files on a function level. Pretty simple to write advanced binary obfuscators using it. Below shows what ~30 LOC using Stitch transforms a function into:
Tweet media one
Tweet media two
0
0
8
@spygrum
pygrum
1 month
You can use stitch's GlobalRefs to write arbitrary data to sections and reference them in the same or later sections - Here's some code replacing a known string with a GlobalRef to my own:
Tweet media one
Tweet media two
Tweet media three
0
2
6
@spygrum
pygrum
1 month
Wrote a cross-platform library for rewriting / modifying code in executable files on a function level. Pretty simple to write advanced binary obfuscators using it. Below shows what ~30 LOC using Stitch transforms a function into:
Tweet media one
Tweet media two
1
20
101
@spygrum
pygrum
4 months
I've finished most of the development for Governor, the flagship Windows 'sensor' / telemetry source for the ALCA engine. Governor can now be used alongside ALCA for dynamic signaturing of Windows malware .
Tweet card summary image
github.com
Flagship Windows Sensor for the ALCA Engine. Contribute to badhive/governor development by creating an account on GitHub.
0
2
7
@spygrum
pygrum
5 months
Been working on a rule engine for dynamic malware analysis - ingests telemetry from a 'sensor' and runs rules and sequences of rules on event data it receives. Currently writing the flagship sensor, but the library itself is available to experiment with:.
Tweet card summary image
github.com
Rule Engine for Dynamic Malware Analysis and Research - badhive/alca
0
3
9
@spygrum
pygrum
1 year
First time sharing progress on something I've been developing since the start of the year - a C2 framework with a focus on modularity. Keen to hear suggestions on features, ideas, research to implement - bearing in mind its at an early development stage
Tweet media one
3
3
17
@spygrum
pygrum
1 year
Gimmick - an in-memory payload obfuscation technique & POC via thread-safe, on-demand section decryption.
Tweet card summary image
github.com
Section-based payload obfuscation technique for x64 - pygrum/gimmick
1
6
39